IMPLEMENTING CLOUD REVOCATION AUTHORITY WITH IDENTITY BASED ENCRYPTION AND ITS APPLICATIONS
Journal Title: International journal of research -GRANTHAALAYAH - Year 2017, Vol 5, Issue 4
Abstract
Identity-based encryption (IBE) is a public key cryptosystem(encoding and decoding) and eliminates the demands of public key infrastructure(PKI) and certificate administration in conventional public key settings. Due to the absence of PKI, the revocation problem is a critical issue in IBE settings. Several revocable IBE schemes have been proposed regarding this issue. Quite recently, by embedding an outsourcing computation technique into IBE, a revocable IBE scheme with a key-update cloud service provider (KU-CSP) was proposed. However, their scheme has two shortcomings. One is that the computation and communication costs are higher than previous revocable IBE schemes. The other shortcoming is lack of scalability in the sense that the KU-CSP must keep a secret value for each user. In the article, we propose a new revocable IBE scheme with a cloud revocation authority (CRA) to solve the two shortcomings namely, the performance is significantly improved and the CRA holds only a system secret for all the users. For security analysis, we demonstrate that the proposed scheme is semantically secure under the decisional bilinear Diffie-Hellman (DBDH) assumption. Finally, we extend the proposed revocable IBE scheme to present a CRA-aided authentication scheme with periodlimited privileges for managing a large number of various cloud services.
FITTING OF AGE-SPECIFIC MORTALITY
The age-pattern of mortality can be represented by various parametric models. In the present paper we consider a mixture of Weibull, Inverse-Weibull, and Gompertz-Makeham (GoMa) survival functions and Heligman–Pollard mo...
LORD KRISHNA IN ILAYARAJA’S ‘NATHA VELIYINILE’- A CRITICAL APPROACH
This article, Lord Krishna in Ilayaraja’s Nathaveliyinile’ tries to prove the power of ‘Gurus’ (Residential Teachers) on helpless disciples. Even Lord Krishna violates the ethics of war to fulfill the ambition of Karma;...
A SURVEY ON OPTIMAL IPV4 TO IPV6 TRANSITION TECHNIQUES
The number of global internet users has been growing exponentially, thereby requiring a much larger number of unique IP addresses for all the connected networking devices. The prevalent IP version 4 is not able to meet t...
USEFULNESS OF EDUBLOGS AS A TOOL TO ENHANCE TEACHING LEARNING PROCESS AMONG STUDENT TEACHERS
The present paper explores one of the most important aspects related to every sector today, including education - the integration of information and communication technology in day to day working. Along with the pedagogi...
POLAR PARTICLE SWARM OPTIMIZATION ALGORITHM FOR SOLVING OPTIMAL REACTIVE POWER PROBLEM
This paper presents Polar Particle Swarm optimization (PPSO) algorithm for solving optimal reactive power problem. The standard Particle Swarm Optimization (PSO) algorithm is an innovative evolutionary algorithm in which...